- π» Iβm a Cybersecurity Specialist with expertise in penetration testing, vulnerability assessment, and digital forensics.
- π Passionate about ethical hacking, malware analysis, and network security.
- π€ Exploring AI in cybersecurity to build next-gen threat detection systems.
- π Skilled in Data Analytics and cybersecurity-driven threat intelligence.
- π± Currently enhancing my knowledge in Red Teaming & Advanced Persistent Threat (APT) simulations.
- β‘ Fun fact: I love solving Capture The Flag (CTF) challenges and staying ahead in the cyber threat landscape.
- Network Security: Wireshark, Nmap, TCPDump, IDS/IPS
- Offensive Security: Metasploit, Burp Suite, Hydra, Aircrack-ng, SQLmap
- Digital Forensics: Autopsy, Volatility, FTK Imager
- OSINT & Threat Hunting: Maltego, Shodan, TheHarvester
- Secure Coding: Web App Security (OWASP Top 10), API Security, DevSecOps
- Cloud Security: AWS, Azure Security
- Python | Bash | PowerShell | JavaScript
- Git & GitHub
- Docker, Kubernetes
- SIEM (Splunk, ELK Stack)
- CEH (Certified Ethical Hacker)
- CompTIA Security+
- OSCP (Offensive Security Certified Professional) β In Progress
- Cisco CCNA Security
- π Threat Intelligence Dashboard β AI-driven real-time threat detection tool. View Repo
- π‘οΈ Web Vulnerability Scanner β Custom automated tool to scan OWASP Top 10 vulnerabilities. View Repo
- π Cyber Attack Analytics β Data visualization for cyber incident response using ELK Stack. View Repo
β βCybersecurity is not just a profession, it's a mindset of protecting the digital world.β